Intelligent anti-lost method based on user entering and exiting gate
An anti-lost, gate technology, applied in the direction of a single input/output port register, instruments, alarms, etc., can solve the hidden danger of mobile intelligent terminal volume and easy loss, mobile intelligent terminal legacy, and mobile intelligent terminal economic loss information Leakage and other problems to achieve the effect of preventing loss
Inactive Publication Date: 2019-01-15
ANHUI PIONEER DOOR IND TECH
6 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses an intelligent anti-lost method based on user entering and exiting a gate. The method comprises the following steps: when determining that a target user enters the door, obtaining an entry fingerprint of the target user, and establishing a communication connection between a mobile terminal carried by the target user and the target gate; and issuing a security alarm after apreset time that the target user corresponding to the entry fingerprint goes out is determined and when the communication connection between the mobile terminal carried by the target user and the target gate is not disconnected. In this way, after the preset time that the target user corresponding to the entry fingerprint goes out is determined, the communication connection between the mobile terminal carried by the target user and the target gate is not disconnected, which indicates that the mobile terminal that the target user will carry is forgotten in the target door; and a security alertis sent through an audible and visual alarm or a message sent to a contact preset by the target user to prevent the mobile terminal from being lost.
Application Domain
Individual entry/exit registersAlarms
Technology Topic
FingerprintSecurity alarm +4
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Internet big data cleaning method
Owner:广州宏数科技有限公司
Interrupt processing method and device and interrupt controller
Owner:SANECHIPS TECH CO LTD
Parallel connection method and parallel connection device for multiple local discharge signals
Owner:SHANGHAI JIAO TONG UNIV
Anti-drop method and device for smart equipment
Owner:SHANGHAI TRANSSION CO LTD
Contact lenses restoration instrument
Owner:SUZHOU SANGECHOUPIJIANG BIOLOGICAL TECH
Classification and recommendation of technical efficacy words
- avoid loss
Ferroelectric memory with wide operating voltage and multi-bit storage per cell
Owner:TEXAS INSTR INC
File recovery method and device for mobile terminal equipment
Owner:LETV HLDG BEIJING CO LTD +1
Method and system for accessing internet by mobile terminal
Owner:深圳市雅阅科技有限公司